• logo
  • Technical OSINT Training

    IOSI109

    Technical OSINT Training

    Registration

    Rapid technological advancements in the IT sector offer both opportunities and challenges for OSINT researchers (both private and government), but also open the door to (criminal) hackers. To stay ahead of these threats, it's essential to view your organization and work processes through the lens of a potential attacker. What are their priorities? How do they infiltrate a network? And how do they minimize digital traces?

    Our Technical OSINT training uses the Cyber ​​Kill Chain to illustrate the various stages a hacker goes through to gain access to your organization. We then focus on the best strategies to secure your organization or research using the "Defense in Depth" approach. This covers physical, technical, and administrative security measures and how to implement them.

    Armed with the knowledge of the hacker mindset and the technical protection options, we then explore how you can conduct your investigations digitally while minimizing your digital footprint.

    “The quieter you become, the more you are able to hear” – offers a fitting mantra for this training.

    Technical OSINT components overview:

    Part 1: Creating awareness about (cyber) threats and the associated techniques.

    Part 2: Applying Threat Modeling and the CIA Triangle for a Solid Security Foundation

    Part 3: Implementation of operational safety measures in both business operations and research.

    Part 4: Understanding and applying the OPSEC process.

    Part 5: Knowledge and insight into the use of hardware and software measures for optimal OPSEC.

    Part 6: Demonstrations and practical examples to clarify and apply the concepts learned.

    Who is this course developed for?

    This one-day training course is designed for individuals active in the field of digital investigations (OSINT) or who wish to gain a deeper understanding of hacker methods and apply this knowledge to protect themselves or their organizations. It is especially beneficial for OSINT investigators and others whose roles require understanding hacker tactics and techniques to enhance digital security and raise awareness of their own digital footprint.

    Course formats: open, private, or customized.
    While this training is primarily offered in a classroom setting, we understand that you may want to ask questions in a private setting due to the nature of your work. With a minimum of twelve participants, we can provide a private training session at our location. We also offer fully customized training courses based on (parts of) this training. We are happy to provide a customized proposal.

    All our instructors have been screened and have signed confidentiality agreements with various government agencies. A specific confidentiality agreement for your organization or agency is also possible.

    Certification & Accreditation:
    Our training institute is audited and registered with the CRKBO (Central Register for Short Vocational Education). After completing this training, you will receive the IACA certificate:

    Technical OSINT

    Our training programs and certifications are widely recognized and highly regarded by various government agencies, as well as a wide range of international organizations outside of government. Whether you already work for such an organization or are pursuing a position with one of these employers, our OSINT training programs are a valuable addition to your resume.

    Successive modules

    As additional training you can choose the training IOSI101: OSINT Module 1 .

    Number of teaching days

    Minimum prior education

    Cost of training

    Start training

    Vacancies

    Flowchart

    OSIDATA

    € 495,-